A user able to connect to Agent 2 can inject an Oracle TNS connection string via the 'service' parameter. This can lead to Agent 2 connecting to an attacker-controlled server and leaking Oracle database credentials if they are saved in a named session.

Project Subscriptions

Vendors Products
Advisories

No advisories yet.

Fixes

Solution

Update the affected components to their respective fixed versions.


Workaround

Don't use named sessions for Oracle database monitoring.

History

Wed, 06 May 2026 08:45:00 +0000

Type Values Removed Values Added
First Time appeared Zabbix
Zabbix zabbix
Vendors & Products Zabbix
Zabbix zabbix

Wed, 06 May 2026 07:30:00 +0000

Type Values Removed Values Added
Description A user able to connect to Agent 2 can inject an Oracle TNS connection string via the 'service' parameter. This can lead to Agent 2 connecting to an attacker-controlled server and leaking Oracle database credentials if they are saved in a named session.
Title Agent 2 Oracle plugin TNS connection string injection via the 'service' parameter
Weaknesses CWE-522
References
Metrics cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:N/VI:L/VA:N/SC:H/SI:H/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: Zabbix

Published:

Updated: 2026-05-06T06:59:42.854Z

Reserved: 2026-01-19T14:02:54.327Z

Link: CVE-2026-23927

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-06T08:16:02.940

Modified: 2026-05-06T08:16:02.940

Link: CVE-2026-23927

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-06T08:30:25Z

Weaknesses